Press Releases

Samsung extends Knox security to its home appliances

2 Mins read

Above: Jong-Hee Han, Vice Chairman, CEO and Head of Device eXperience Division at Samsung Electronics.

It’s a common belief that only computers need protection against cyberattacks. But the truth is that we should keep any device with Internet access protected. Any connected device that has applications that may contain sensitive user information, such as our favorite streaming platforms, can be vulnerable to malware or virus attacks, and even worse, hackers or cybercriminals looking to steal users’ personal information.

In response to this, Samsung Electronics has taken action to protect as it aims to strengthen the security of not only individual products but also interconnected devices.

At the Samsung Developer Conference 2024 (SDC24), which was held in California earlier this month, Samsung announced plans to extend Knox Matrix from mobile devices and TVs to home appliances. Knox Matrix provides integrated protection for interconnected devices, allowing them to mutually monitor for security threats and notify users of threat-blocking measures.

In addition, Samsung plans to introduce mobile biometric authentication to its home appliances next year — eliminating the need to enter IDs and passwords and preventing login information from being exposed.

Detecting security threats and notifying users

All Samsung smart home appliances are safeguarded by Samsung Knox, a holistic and multi-defense security platform that protects users’ data from external threats including malicious software. Nonetheless, Samsung set out to build a secure environment for interconnected devices since strong connectivity between devices creates an improved user experience and protection against data exposure in the age of AI home appliances.

Knox Matrix is a security solution that comprehensively protects connected devices and networks using private blockchain technology. The system consists of Trust Chain, Cross Platform and Credential Sync.

Based on blockchain technology, Trust Chain allows connected devices to monitor each other for security threats and notifies users of threat-blocking measures if there is a problem with the security status. Cross Platform ensures consistent security standards are applied to connected devices, even if they run on different operating systems (OS) and platforms. Credential Sync encrypts data shared between devices and synchronizes credentials to maintain security.

Samsung plans to expand the application of Knox Matrix’s Trust Chain, Cross Platform and Credential Sync to major products such as the refrigerator with AI Family Hub™ beginning next year.

Introducing biometric authentication

At SDC24, Samsung also announced that Passkey will be introduced next year to the refrigerator with AI Family Hub™ as well as home appliances equipped with the 7-inch AI Home LCD screen. Part of Credential Sync, Passkey is a digital credential that allows users to log in to home appliance apps and websites using biometrics such as fingerprints on their smartphones. With the increasing use of apps and web services, the risk of password leaks is on the rise. Passkey alleviates this concern and eliminates the inconvenience of having to remember passwords for each login.

Furthermore, Samsung is planning to apply Knox Vault to its AI home appliances starting next year to further improve hardware-based security. Samsung home appliances equipped with Knox Vault will store sensitive personal information such as passwords and biometric data on a separate hardware security chip — protecting sensitive information from OS-based security breaches or physical hacks.

Additionally, Samsung conducts internal cyberattack simulations at least once a quarter to verify the security of its AI home appliances. The company’s software developers perform these hacking tests on products and services to identify vulnerabilities and create updates to address any security flaws.

“As the connected ecosystem of AI home appliances expands, the importance of security is growing exponentially,” said Miyoung Yoo, EVP and Head of the Software Development Team, Digital Appliances Business at Samsung Electronics. “Samsung will continue to develop security solutions and achieve new certifications to ensure that users can experience peace of mind when using AI home appliances and services in Samsung’s ecosystem.”

z

What keeps regional cybersecurity experts awake at night

What keeps regional cybersecurity experts awake at night

Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
Read More
Where hackers begin

Where hackers begin

Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Read More
Blue skies for microblogging?

Blue skies for microblogging?

Bluesky hit its current high of 23 million users faster than expected, but it’s way behind X.
Read More
The apps that thrive in Apple’s ecosystem

The apps that thrive in Apple’s ecosystem

By Apple's own yardstick an app that shares usable data across three devices is acceptable one that synchronises with four is a winner.
Read More
America’s open mic moment

America’s open mic moment

What made online pundits so effective in the US election?
Read More
The press and the president-elect

The press and the president-elect

Beyond the president-elect's often-expressed intent to retaliate against journalists he believes are unfairly attacking him is the agenda of Project 2025.
Read More
All washed up

All washed up

Dirt on its own will simply shake out of fabric. What keeps it in place is oil and grease, readily generated by human skin.
Read More
The state of Caribbean digital transformation

The state of Caribbean digital transformation

Despite 87 per cent believing that digital will disrupt their industry, 87 per cent acknowledged that they don't have the right leaders
Read More
The WordPress War

The WordPress War

WPEngine and the websites of its customers were blocked from the WordPress log-in system theme and plug-in updates and other background processes that enable a Wordpress website.
Read More
A budget of concrete and asphalt

A budget of concrete and asphalt

Four years after Hassel Bacchus took up the pioneering role of Digital Transformation Minister, the 2025 budget could not identify any completed transformation project that's positively affected citizens.
Read More
Arima’s first step toward becoming a smart city

Arima’s first step toward becoming a smart city

The public WiFi was officially activated on September 28 at the hospital, and it's fast. A local ping registered 250 megabits of download speed and 126 for upload.
Read More
Now hear this!

Now hear this!

Budget headsets will effectively dampen ambient sounds, but tend to be an all or nothing solution.
Read More
A taxing time for all

A taxing time for all

Tax collection began using the least customer-friendly interface imaginable, lines outside a government building.
Read More
Mobile devices, a war of increments

Mobile devices, a war of increments

Mixing and matching the two rival ecosystems is essentially impossible, so it's the utility of the products combined that makes the biggest difference.
Read More
Why cash is king in Trinidad and Tobago

Why cash is king in Trinidad and Tobago

In 2017, 16 per cent of users owned a credit card, a figure that dropped to 15 per cent by 2023.
Read More
I shopped at Temu!

I shopped at Temu!

Temu is great fun to explore and offers many bargains but product quality can be wildly variable.
Read More
What’s needed to make e-Governance happen?

What’s needed to make e-Governance happen?

“If we look at successful governments that have achieved a certain level in of success in these programs, some things stand out."
Read More
Changing the education conversation

Changing the education conversation

There are local schools that aspire to continuous improvement and others that struggle to make it through a working day without bloodshed.
Read More
Practical steps to reducing cybersecurity risks

Practical steps to reducing cybersecurity risks

The process, to be effective, must be ongoing and managed to ensure that vendors meet required standards.
Read More
The consequences of careless code

The consequences of careless code

The cruel reality of Crowdstrike is that it wasn't a cybersecurity attack. It was a quality of service lapse and the incident puts IT professionals in an odd space.
Read More
What keeps regional cybersecurity experts awake at night What keeps regional cybersecurity experts awake...
Where hackers begin Where hackers begin
Blue skies for microblogging? Blue skies for microblogging?
The apps that thrive in Apple’s ecosystem The apps that thrive in Apple’s...
America’s open mic moment America’s open mic moment
The press and the president-elect The press and the president-elect
All washed up All washed up
The state of Caribbean digital transformation The state of Caribbean digital transformation
The WordPress War The WordPress War
A budget of concrete and asphalt A budget of concrete and asphalt
Arima’s first step toward becoming a smart city Arima’s first step toward becoming a...
Now hear this! Now hear this!
A taxing time for all A taxing time for all
Mobile devices, a war of increments Mobile devices, a war of increments
Why cash is king in Trinidad and Tobago Why cash is king in Trinidad...
I shopped at Temu! I shopped at Temu!
What’s needed to make e-Governance happen? What’s needed to make e-Governance happen?
Changing the education conversation Changing the education conversation
Practical steps to reducing cybersecurity risks Practical steps to reducing cybersecurity risks
The consequences of careless code The consequences of careless code

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
FeaturedPress Releases

Samsung leans in on extended reality (XR)

3 Mins read
Supported by the broader Galaxy ecosystem, this technology will empower and transform your everyday life in a way that only we can deliver.
BitDepthFeatured

What keeps regional cybersecurity experts awake at night

4 Mins read
Whether the attack comes from a successful external attempt, exploiting a vulnerability or from inside, perhaps a disgruntled employee, an exploit needs just one vulnerability.
BitDepthFeatured

Where hackers begin

3 Mins read
Digital nation strategies have been released by 170 countries and regions and more than 60 countries have elevated AI in their national strategy.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
Press Releases

Samsung announces US$7 billion profit attributable to AI chips

0
Share your perspective in the comments!x
()
x